Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Saturday, November 06, 2010

Moving from SQL to NoSQL

Moving from SQL to NoSQL

Are you thinking on moving your database from a SQL implementation to a
NoSQL one ?

Sometimes when you decide to move to a different approach lots of doubts
pop out of your mind, there are a couple of actions that can make your
decision more solid and secure. I'll try to provide some tips that would
help you to choose the right NoSQL implementation.
When do you need to think about NoSQL ?

Often web application start by being implemented on top of MySQL, the one
day your application got traction and performance issues start to be a
real pain due to high load of read/write queries on your system.

At this point you have 2 choices:

1. "Shard" your data to partition it across several sites
2. Go for a licensed SQL DBMS or move to a NoSQL DBMS

Basically, you need to scale with less amount of money spent possible.
Michael Stonebraker written a good article on this.

NoSQL use cases

1. Massive data volumes
2. Extreme query load
3. Schema mutation (often called as evolution)

NoSQL most popular pro's

* Scalability and Elasticity (at low cost)
* High Availability
* Flexible schemas (semi-structured data)
* Distributed (easily)
* Low Cost

NOSQL most popular con's

* Weak integrity models
* Consistency (called eventual consistency)
* Transactions (You can do it by code)
* Complex queries
* No standardization
* Messy access control (Some popular implementations already doing this)

Basically, NoSQL runs away from the ACID (atomicity, consistency,
isolation, durability) terminology.
NoSQL most popular implementations

As every topic, there are come popular and trendy implementations of
NoSQL: CouchDb, MongoDB , Cassandra, Memcache.

For a complete list, please refer to wikipedia.
Interesting to read articles/presentations on NoSQL.

1. "NoSQL Databases – Part 1 – Landscape" at VineetGupta.com
2. "Why Digg Digs Cassandra" by Om Malik at Gigaom
3. "NoSQL at Twitter (NoSQL EU 2010)" by Kwvin Weil at Slideshare
4. "NoSQL databases" by Marin Dimitrov at Slideshare

But the sky isn't always blue, you should read the voices that are against
NoSQL also:

1. I Can't Wait for NoSQL to Die by Ted Dziupa
2. NoSQL is Software Darwinism by Jeremy Zawodny

So how do you choose the right NoSQL implementation ?

I must answer with the magic sentence: It depends!

You must choose you database storage system based on the problem you are
trying to solve, but there is one thing that is universal to all of them,
you have to make tests with more than one and only by making results
analysis you will be able to take decisions, unless you are a guesser, i
am not.

My advice is, choose your most common use cases and perform small proof of
concepts, and only after having the numbers you should choose.

from: http://blog.josedasilva.net/moving-from-sql-to-nosql/

Thursday, November 04, 2010

Data Center Audit

Data center audit or site review is one of mandatory activity during
IT audit process. But most of IS auditor forget key activity that
should be checked during the process. Here is simple audit checklist
to be used:

1. Policies & Procedure
• Have computer center operating policies and procedures been written?
• Are they sufficiently descriptive in detail to guide the
organization and operation?
• Do data center personnel aware to the policies and procedures?
• Are they kept up-to-date?

2. Personnel
• Are data control center personnel and operators' assignments rotated?
• Is an operating log maintained to record any significant events and
action taken by the operator?
• Is the operator log inspected daily by management?

3. Incident handling
• Do the computer room operators know exactly what to do when the
different types of fire emergencies occur?
• Do the other personnel know exactly what to do when fire emergencies occur?

4. Fire Alarm
• Are the fire alarm pull boxes and emergency power switches clearly
visible and unobstructed?
• Are clear and adequate fire instructions posted in all locations?
• Are there enough fire alarm pull boxes in the computer area?
• Are the operators trained periodically in fire fighting?
• Are the operators assigned individual responsibilities in case of fire?
• How frequently are fire drills held?

5. Fire extinguisher
• Sprinkler
• Halon
• FM200

6. Air Conditioner
• Is the power of Air Conditioner separated from main building power?
• How frequently the Air Conditioner checked

7. Environment Control
• Wiring and cable management
• Combustible goods should be removed
• Water and liquid good should be located outside data center
• How data center protected? Secure ID? Finger print? Lock?

Idea Management Across the Organization Made Easy!

Common characteristics in an idea management system. A good one to start with - use an open source cms.

Every business development manager or chief innovation office needs to be asking this question: How do you coordinate activities and cultivate people to get more and better ideas to improve your business? While every organization should design its Idea Management processes according to its own needs, certain characteristics are common to all idea management systems. Open source CMS Idea Management System.
  • Ideas, big and small ones, are encouraged and welcomed.
  • Submitting ideas is simple.
  • A central repository or meeting place for ideas to be cultivated and exchanged.
  • A vehicle to exlpore ideas from inside and outside the business.
  • A method to track ideas.
  • Evaluation of ideas is quick and effective.
  • Feedback is timely, constructive, and informative.
  • Implementation is rapid and smooth.
  • Ideas are reviewed for additional potential.
  • Ideas are shared across the organization.
  • People are recognized, and success is celebrated.
  • Idea Management system performance is measured, reviewed, and improved.
Advancing Insights makes the whole process of idea management easy with social networking software and community software solutions.
From Computeworld, "Tap the wisdom of employees -- and boost the bottom line. Collective-intelligence tools can shepherd the best and brightest ideas and turn them into huge bonanzas."

Tuesday, November 02, 2010

Membuat koneksi VPN SSL dgn Draytek Vigor

Using SSL VPNs

VPNs (Virtual Private Networks) enable you to link two remote computers or
networks securely using the public Internet. An encrypted tunnel is
created to carry your private data between the two sites. Tunnels making
use of PPTP, L2TP, AES and IPSec protocols have been available on Vigor
routers for many years and provide a simple to set up solution for your
site-to-site or teleworker VPNs. SSL VPNs provide a new method for
teleworker to central site VPN, providing great convenience, low TCO and
simplicity where other methods may not be possible.

Note : SSL VPN is available on the DrayTek Vigor 2950 and VigorPro models.

The need for SSL VPNs

One potential drawback of using the above methods for a
Teleworker-to-central site VPN is that they need compatiable protocol
stacks at each end (e.g. an IPSec client or hardware) and most importantly
those protocols need to be freely passed by your local host network. This
isn't normally a problem where you own the computers and the network in
use and you can install any client, software or hardware you choose, as
well as allowing any traffic types you like. Where it can become a problem
is where you are using someone else's computer or network where either you
cannot use the O/S VPN client, or the host network blocks VPN protocols or
makes them unreliable. This is most commonly a problem when using WiFi
hotspots or other public Internet access methods (hotels, conference
centres etc.).

You may already have heard of SSL previously, and you have almost
certainly used it. SSL (Secure Sockets Layer) is the protocol used by all
web browsers for accessing 'secure' web sites. You will have used secure
web sites whenver you have used your credit card online or accessed your
banking web sites, for example. SSL is supported by all web browsers, and
as it is so commonly used, all hotspots and other public Internet will
always allow SSL to pass properly.

detail article:
http://www.draytek.co.uk/support/kb_vigor_ssl.html

Contact us for price and demo:


Fanky Christian
Business Development Director
PT. DAYA CIPTA MANDIRI SOLUSI
IBEC Building 2nd Fl
Jl. KH Wahid Hasyim No.84-86
Jakarta Pusat, 10340, Indonesia
SMS: 62-21-98054359
Telp: 62-21-3924716
Fax: 62-21-3903432
mobile: 62-812-1057533
www.dayaciptamandiri.com

Online Store: www.tokofc.com

Monday, November 01, 2010

10 things: Handicapping Gartner's top technologies for 2011

By Larry Dignan | October 19, 2010, 6:26am PDT

Gartner on Tuesday outlined its top 10 technologies for 2011 that will give technology execs the most bang for their budgets. How many of these technologies will be a true hit?

Carl Claunch, an analyst at Gartner, said at the research firm's Symposium conference in Orlando that things like sustainability, data center overhauls and virtualization were dropped. Here's Gartner's 2011 list, why those technologies were chosen and a few observations.

The new list:

And the breakdown:

1. Cloud computing: This group of technologies has been on the top 10 lists for a few years. Now everything as a service will alter business models and IT procurement. David Cearley, an analyst at Gartner, said what has changed is that there are multiple services. Companies will probably need cloud computing brokers. Things to watch:

Where does the public cloud fit? IT is generally scared of the public cloud, but select workloads are fine.

Beware cloud washing. IT execs are comfortable with the vendors cloudwashing, but may not get real capability.

Limit access to specific clouds based on community and groups. That approach would minimize security risks. Gartner has exclusive clouds and community clouds as services to watch.

Private clouds are custom and packaged.

My impression: A safe pick for sure, but the cloud is getting more granular as it matures. Think cloudwashing magnified.

2. Mobile apps and media tablets. Tablets and touch isn't new. Claunch said that the selection of applications changes the game for businesses. "Apple has leveraged the ecosystem of the iPhone," said Claunch. "And Apple has created consistency." In addition, Apple's iPad is the poster child for how consumerization is affecting corporate IT. Things to think about for enterprise IT:

Enterprise apps will need to be designed for the tablet;

Delivering these apps gets complicated due to the selection of platforms;

Context aware computing can connect to customers better;

Marketing will drive a lot of projects to utilize tablets, but these devices can be used for inspections, surveys, image capture, documentation and training.

Cearley added that "the PC era is over. Think of mobile design points."

My impression: It's stunning how many iPads are in this crowd of 7,000 plus IT execs and managers. Another thread: Almost all of these IT execs are carrying PCs not Macs. Typically, CIOs and the like are the last to get on board an early adoption curve for a new device. There's a frenzy over tablets.

3. Next-gen analytics. Companies need to develop "operational analytics" to make predictions and use data mashups. "There's value in very current information. We are now shifting our focus to start doing simulations and modeling to predict the future," said Claunch. These simulations would ultimately be run on smartphones and other devices. Algorithms will really matter to companies to support the right type of prediction.

Gartner didn't advocate doing a lot of analytics investment yet, but be ready to invest.

My impression: Analytics is largely untapped ground for many companies. Claunch's key point: "This is just being enabled now." Another key item: A show of hands showed the entire room had business intelligence software. A show of hands also showed that no one thought those applications were delivering real value.

4. Social analytics. This concept revolves around taking social networking data and incorporating it into enterprise analysis. Sentiment, context and influence are key areas for companies. "We're starting to see the tipping point," said Cearley. "It's moving from bleeding edge to mainstream activity." For now, look at communities you have to support and analyze an entry.

My impression: CIOs should be watching this stuff, but given the crowd response to business intelligence, I'm not seeing much progress on the analytics-social intersection.

5. Social communication and collaboration. Social collaboration is "inevitable," says Cearley. "Over the next few years it will be impossible to ignore this," he added. By now, companies should have policies, high value social uses identified and have experiments to link social with CRM systems. Meanwhile, unified communications will merge with social. Expertise location will probably be the best use case.

My impression: Gartner makes a good point, but I'd be willing to bet that enterprises are way behind the curve on social communication and what it means for collaboration and productivity.

6. Video. Corporate use of video is going mainstream. Low-cost video recorders are everywhere. Companies will need video content management systems, better design skills, privacy issues and policy concerns. Will all conference rooms be recorded by default? E-learning, merchandising, marketing, webinars and telepresence will all be key video uses. Tipping point comes 2011 to 2013.

In addition, video will be needed to reach younger employees.

My impression: Video has hit mainstream, but networks haven't. Will Vlogs really be the best use of employee time? One other key point: How will business intelligence systems digest video content?

7. Context aware computing. The idea here is that social analytics and computing leads to knowledge about preferences. User interfaces would change based on context. Today, it's all reactive. By 2011-2013 there will be more proactive alerts. By 2014-2018, you'll have context integrated with enterprise systems. Ultimately, there will be a context platform. Portals, mashups, mobile and social will combine. Vendors will offer "user experience platforms."

My impression: I have a hard time seeing strapped enterprises going all contextual. Look for business units such as marketing to launch these projects to drive sales. Companies will need to deliver context-aware services to businesses. Can't wait for all of those user experience platform pitches.

8. Ubiquitous computing. This topic has been discussed in previous years on Gartner's lists. In a nutshell, computers melt into objects. There will be machine to machine connections, portable personalities and connectivity changes across multiple devices. There will be thousands of computers for each person on the planet and you'll have multiple devices.

My impression: Ubiquitous computing is more guiding principle for projects rather than something you think about in terms of budget. The timeline here is decades. What's also notable: Everyone has punted on getting one device to consolidate them all. We're doomed to carry a bunch of devices.

9. Storage class memory. When Flash meets RAM there are differences in speed and costs. Persistent storage will also alter management. Claunch said that storage class memory goes beyond solid state drives. This new class of storage will lead to software where operating systems determine where data goes.  Storage class memory will become more important over the next two to three years.

My impression: It's a bit experimental, but storage class memory will ride shotgun with analytics. Companies will have to define what data goes into fast memory.

10. Fabric based infrastructure and computers. Every vendor will talk fabric computing so get ready for fabric-washing. The overall idea here is that you'll have infrastructure that manages resources in an integrated fashion. Cisco UCS, HP Matrix are examples. New ways of building servers will mean you buy pools of processors and memory instead of physically swapping boxes.

My impression: Forming your own flexible servers sounds appealing. The fabric thing sounds way futuristic for now, but the seeds are being planted.

More from Gartner Symposium:

Your network is so screwed

Workers increasingly picking up corporate connectivity tab

Apple in the enterprise: Do the extra costs justify the value?

IT supervendors: They can buy innovation, but can't maintain it

Apple's iPad goes to campus: A look at the opportunities, hurdles


Infrastructure-Application-ManagedServices.Visit www.dayaciptamandiri.com for details..